Abstract | ||
---|---|---|
Finding the root-cause of a network security anomaly is essential for network operators. In our recent work, we introduced a generic technique that uses frequent itemset mining to automatically extract and summarize the traffic flows causing an anomaly. Our evaluation using two different anomaly detectors (including a commercial one) showed that our approach works surprisingly well extracting the anomalous flows in most studied cases using sampled and unsampled NetFlow traces from two networks. In this demonstration, we will showcase an open-source anomaly-extraction system based on our technique, which we integrated with a commercial anomaly detector and use in the NOC of the GÉANT network since late 2009. We will report a number of detected security anomalies and will illustrate how an operator can use our system to automatically extract and summarize anomalous flows. |
Year | DOI | Venue |
---|---|---|
2010 | 10.1145/1851182.1851267 | SIGCOMM |
Keywords | Field | DocType |
association,association rules,association rule,measurement,traffic flow,security,root cause analysis,network security,design | Data mining,Computer science,Computer security,NetFlow,Root cause analysis,Network security,Association rule learning,Operator (computer programming),Distributed computing | Conference |
Volume | Issue | ISSN |
40 | 4 | 0146-4833 |
Citations | PageRank | References |
4 | 0.43 | 2 |
Authors | ||
5 |
Name | Order | Citations | PageRank |
---|---|---|---|
Ignasi Paredes-Oliva | 1 | 33 | 3.32 |
Xenofontas Dimitropoulos | 2 | 1015 | 79.84 |
M. Molina | 3 | 17 | 2.13 |
Pere Barlet-ros | 4 | 269 | 27.74 |
Daniela Brauckhoff | 5 | 123 | 7.38 |